Network Security

Impact analysis

Entity systems generate information that is reviewed and evaluated to determine impacts on the functioning of internal controls.

Limit Network Connections

Entity ensures that the production databases access and Secure Shell access to infrastructure entities are protected from public internet access.

Transmission Confidentiality

Entity has set up processes to utilize standard encryption methods, including HTTPS with the TLS algorithm, to keep transmitted data confidential.

Anomalous Behavior

Entity's infrastructure is configured to review and analyze audit events to detect anomalous or suspicious activity and threats

Capacity & Performance Management

Entity has set up methods to continuously monitor critical assets to generate capacity alerts to ensure optimal performance, meet future capacity requirements, and protect against denial-of-service attacks.

Data used in Testing

Entity ensures that customer data used in non-Production environments requires the same level of protection as the production environment.

Centralized Collection of Security Event Logs

Entity's infrastructure is configured to generate audit events for actions of interest related to security for all critical systems.